/system/sepolicy/private/ |
D | init.te | 1 typeattribute init coredomain; 3 tmpfs_domain(init) 5 # Transitions to seclabel processes in init.rc 6 domain_trans(init, rootfs, healthd) 7 domain_trans(init, rootfs, slideshow) 8 domain_auto_trans(init, charger_exec, charger) 9 domain_auto_trans(init, e2fs_exec, e2fs) 10 domain_auto_trans(init, bpfloader_exec, bpfloader) 14 domain_trans(init, rootfs, adbd) 15 domain_trans(init, rootfs, charger) [all …]
|
D | property.te | 70 # init is in coredomain, but should be able to read/write all props. 72 neverallow { coredomain -init -dumpstate } { 79 neverallow { coredomain -init } { 122 -init 141 -init 146 -init 240 -init 317 -init 337 -init 344 # Only allow init and system_server to set system_adbd_prop [all …]
|
D | bug_map | 4 init app_data_file file b/77873135 5 init cache_file blk_file b/77873135 6 init logpersist file b/77873135 7 init nativetest_data_file dir b/77873135 8 init pstorefs dir b/77873135 9 init shell_data_file dir b/77873135 10 init shell_data_file file b/77873135 11 init shell_data_file lnk_file b/77873135 12 init shell_data_file sock_file b/77873135 13 init system_data_file chr_file b/77873135
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | init.te | 1 typeattribute init coredomain; 3 tmpfs_domain(init) 5 # Transitions to seclabel processes in init.rc 6 domain_trans(init, rootfs, healthd) 7 domain_trans(init, rootfs, slideshow) 8 domain_auto_trans(init, charger_exec, charger) 9 domain_auto_trans(init, e2fs_exec, e2fs) 10 domain_auto_trans(init, bpfloader_exec, bpfloader) 14 domain_trans(init, rootfs, adbd) 15 domain_trans(init, rootfs, charger) [all …]
|
D | property.te | 70 # init is in coredomain, but should be able to read/write all props. 72 neverallow { coredomain -init -dumpstate } { 79 neverallow { coredomain -init } { 122 -init 141 -init 146 -init 240 -init 317 -init 337 -init 344 # Only allow init and system_server to set system_adbd_prop [all …]
|
D | bug_map | 4 init app_data_file file b/77873135 5 init cache_file blk_file b/77873135 6 init logpersist file b/77873135 7 init nativetest_data_file dir b/77873135 8 init pstorefs dir b/77873135 9 init shell_data_file dir b/77873135 10 init shell_data_file file b/77873135 11 init shell_data_file lnk_file b/77873135 12 init shell_data_file sock_file b/77873135 13 init system_data_file chr_file b/77873135
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | init.te | 1 # init is its own domain. 2 type init, domain, mlstrustedsubject; 6 # /dev/__null__ node created by init. 7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms }; 10 # init direct restorecon calls. 13 allow init tmpfs:chr_file relabelfrom; 14 allow init kmsg_device:chr_file { getattr write relabelto }; 17 allow init kmsg_debug_device:chr_file { open write relabelto }; 20 allow init properties_device:dir relabelto; 21 allow init properties_serial:file { write relabelto }; [all …]
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | init.te | 1 # init is its own domain. 2 type init, domain, mlstrustedsubject; 6 # /dev/__null__ node created by init. 7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms }; 10 # init direct restorecon calls. 13 allow init tmpfs:chr_file relabelfrom; 14 allow init kmsg_device:chr_file { getattr write relabelto }; 17 allow init kmsg_debug_device:chr_file { write relabelto }; 20 allow init properties_device:dir relabelto; 21 allow init properties_serial:file { write relabelto }; [all …]
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | init.te | 1 # init is its own domain. 2 type init, domain, mlstrustedsubject; 4 # The init domain is entered by execing init. 7 # /dev/__null__ node created by init. 8 allow init tmpfs:chr_file { create setattr unlink rw_file_perms }; 11 # init direct restorecon calls. 14 allow init tmpfs:chr_file relabelfrom; 15 allow init kmsg_device:chr_file { write relabelto }; 18 allow init kmsg_debug_device:chr_file { write relabelto }; 21 allow init properties_device:dir relabelto; [all …]
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | init.te | 1 # init is its own domain. 2 type init, domain, mlstrustedsubject; 4 # The init domain is entered by execing init. 7 # /dev/__null__ node created by init. 8 allow init tmpfs:chr_file { create setattr unlink rw_file_perms }; 11 # init direct restorecon calls. 14 allow init tmpfs:chr_file relabelfrom; 15 allow init kmsg_device:chr_file { write relabelto }; 17 allow init properties_device:dir relabelto; 18 allow init properties_serial:file { write relabelto }; [all …]
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | init.te | 1 # init is its own domain. 2 type init, domain, mlstrustedsubject; 4 # The init domain is entered by execing init. 7 # /dev/__null__ node created by init. 8 allow init tmpfs:chr_file { create setattr unlink rw_file_perms }; 11 # init direct restorecon calls. 14 allow init tmpfs:chr_file relabelfrom; 15 allow init kmsg_device:chr_file { write relabelto }; 18 allow init kmsg_debug_device:chr_file { write relabelto }; 21 allow init properties_device:dir relabelto; [all …]
|
/system/sepolicy/public/ |
D | init.te | 1 # init is its own domain. 2 type init, domain, mlstrustedsubject; 6 # /dev/__null__ node created by init. 7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms }; 10 # init direct restorecon calls. 13 allow init tmpfs:chr_file relabelfrom; 14 allow init kmsg_device:chr_file { getattr write relabelto }; 17 allow init kmsg_debug_device:chr_file { open write relabelto }; 20 # allow init to mount and unmount debugfs in debug builds 22 allow init debugfs:dir mounton; [all …]
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | init.te | 1 # init is its own domain. 2 type init, domain, mlstrustedsubject; 6 # /dev/__null__ node created by init. 7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms }; 10 # init direct restorecon calls. 13 allow init tmpfs:chr_file relabelfrom; 14 allow init kmsg_device:chr_file { getattr write relabelto }; 17 allow init kmsg_debug_device:chr_file { open write relabelto }; 20 # allow init to mount and unmount debugfs in debug builds 22 allow init debugfs:dir mounton; [all …]
|
/system/chre/apps/wifi_offload/test/ |
D | utility.cc | 23 void init(uint8_t &val, RandomGenerator &rand_gen) { in init() function 27 void init(uint16_t &val, RandomGenerator &rand_gen) { in init() function 31 void init(uint32_t &val, RandomGenerator &rand_gen) { in init() function 35 void init(uint64_t &val, RandomGenerator &rand_gen) { in init() function 39 void init(uint8_t *arr, size_t len, RandomGenerator &rand_gen) { in init() function 46 init(sec_mode, rand_gen); in init_security_mode() 70 void init(wifi_offload::Ssid &ssid, RandomGenerator &rand_gen) { in init() function 73 init(rand_ssid, len, rand_gen); in init() 77 void init(wifi_offload::PreferredNetwork &net_info, RandomGenerator &rand_gen) { in init() function 78 init(net_info.ssid_, rand_gen); in init() [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | init.te | 1 typeattribute init coredomain; 3 tmpfs_domain(init) 5 # Transitions to seclabel processes in init.rc 6 domain_trans(init, rootfs, healthd) 7 domain_trans(init, rootfs, slideshow) 8 domain_auto_trans(init, charger_exec, charger) 9 domain_auto_trans(init, e2fs_exec, e2fs) 10 domain_auto_trans(init, bpfloader_exec, bpfloader) 14 domain_trans(init, rootfs, adbd) 15 domain_trans(init, rootfs, charger) [all …]
|
D | bug_map | 4 init app_data_file file b/77873135 5 init cache_file blk_file b/77873135 6 init logpersist file b/77873135 7 init nativetest_data_file dir b/77873135 8 init pstorefs dir b/77873135 9 init shell_data_file dir b/77873135 10 init shell_data_file file b/77873135 11 init shell_data_file lnk_file b/77873135 12 init shell_data_file sock_file b/77873135 13 init system_data_file chr_file b/77873135
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | init.te | 1 typeattribute init coredomain; 3 tmpfs_domain(init) 5 # Transitions to seclabel processes in init.rc 6 domain_trans(init, rootfs, healthd) 7 domain_trans(init, rootfs, slideshow) 8 domain_auto_trans(init, charger_exec, charger) 9 domain_auto_trans(init, e2fs_exec, e2fs) 10 domain_auto_trans(init, bpfloader_exec, bpfloader) 14 domain_trans(init, rootfs, adbd) 15 domain_trans(init, rootfs, charger) [all …]
|
D | bug_map | 3 init app_data_file file 77873135 4 init cache_file blk_file 77873135 5 init logpersist file 77873135 6 init nativetest_data_file dir 77873135 7 init pstorefs dir 77873135 8 init shell_data_file dir 77873135 9 init shell_data_file file 77873135 10 init shell_data_file lnk_file 77873135 11 init shell_data_file sock_file 77873135 12 init system_data_file chr_file 77873135
|
D | coredomain.te | 9 -init 26 -init 42 -init 59 -init 76 -init 95 -init 102 -init 111 -init 119 -init 128 -init [all …]
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | init.te | 1 typeattribute init coredomain; 3 tmpfs_domain(init) 5 # Transitions to seclabel processes in init.rc 6 domain_trans(init, rootfs, charger) 7 domain_trans(init, rootfs, healthd) 8 domain_trans(init, rootfs, slideshow) 9 domain_auto_trans(init, e2fs_exec, e2fs) 11 domain_trans(init, rootfs, adbd) 12 domain_trans(init, rootfs, recovery) 14 domain_trans(init, shell_exec, shell) [all …]
|
D | bug_map | 8 init app_data_file file 77873135 9 init cache_file blk_file 77873135 10 init logpersist file 77873135 11 init nativetest_data_file dir 77873135 12 init pstorefs dir 77873135 13 init shell_data_file dir 77873135 14 init shell_data_file file 77873135 15 init shell_data_file lnk_file 77873135 16 init shell_data_file sock_file 77873135 17 init system_data_file chr_file 77873135
|
/system/chre/apps/wifi_offload/test/include/ |
D | utility.h | 58 void init(uint8_t &val, RandomGenerator &rand_gen); 59 void init(uint16_t &val, RandomGenerator &rand_gen); 60 void init(uint32_t &val, RandomGenerator &rand_gen); 61 void init(uint64_t &val, RandomGenerator &rand_gen); 62 void init(uint8_t *arr, size_t len, RandomGenerator &rand_gen); 63 void init(wifi_offload::Ssid &ssid, RandomGenerator &rand_gen); 64 void init(wifi_offload::PreferredNetwork &net_info, RandomGenerator &rand_gen); 65 void init(wifi_offload::ScanRecord &record, RandomGenerator &rand_gen); 66 void init(wifi_offload::RpcLogRecord &record, RandomGenerator &rand_gen); 67 void init(wifi_offload::ChannelHistogram &histo, RandomGenerator &rand_gen); [all …]
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | init.te | 1 typeattribute init coredomain; 3 tmpfs_domain(init) 5 # Transitions to seclabel processes in init.rc 6 domain_trans(init, rootfs, charger) 7 domain_trans(init, rootfs, healthd) 8 domain_trans(init, rootfs, slideshow) 9 domain_auto_trans(init, e2fs_exec, e2fs) 11 domain_trans(init, rootfs, adbd) 12 domain_trans(init, rootfs, recovery) 14 domain_trans(init, shell_exec, shell) [all …]
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | init.te | 1 typeattribute init coredomain; 3 tmpfs_domain(init) 5 # Transitions to seclabel processes in init.rc 6 domain_trans(init, rootfs, adbd) 7 domain_trans(init, rootfs, charger) 8 domain_trans(init, rootfs, healthd) 9 domain_trans(init, rootfs, slideshow) 11 domain_trans(init, rootfs, recovery) 13 domain_trans(init, shell_exec, shell) 14 domain_trans(init, init_exec, ueventd) [all …]
|
/system/netd/tests/ |
D | tun_interface.h | 32 int init(const std::string& ifName, bool isTap); 35 int init() { return init("", false); } in init() function 36 int init(const std::string& ifName) { return init(ifName, false); } in init() function 37 int init(bool isTap) { return init("", isTap); } in init() function
|